语言:
http://www.nessus.org/u?091dd41b
http://www.nessus.org/u?30bb5270
http://www.nessus.org/u?7760536b
https://access.redhat.com/errata/RHSA-2012:1009
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=829354
https://bugzilla.redhat.com/show_bug.cgi?id=829358
https://bugzilla.redhat.com/show_bug.cgi?id=829360
https://bugzilla.redhat.com/show_bug.cgi?id=829361
https://bugzilla.redhat.com/show_bug.cgi?id=829371
https://bugzilla.redhat.com/show_bug.cgi?id=829372
https://bugzilla.redhat.com/show_bug.cgi?id=829373
https://bugzilla.redhat.com/show_bug.cgi?id=829374
严重性: Critical
ID: 59637
文件名: redhat-RHSA-2012-1009.nasl
版本: 1.31
类型: local
代理: unix
发布时间: 2012/6/21
最近更新时间: 2025/4/15
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: Critical
分数: 9.8
Vendor Severity: Important
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2012-1725
风险因素: Critical
基本分数: 9.8
时间分数: 9.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2012-1723
CPE: p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-javadoc, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-devel, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-src, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-demo
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2012/6/20
漏洞发布日期: 2012/6/16
CISA 已知可遭利用的漏洞到期日期: 2022/3/24
Core Impact
Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)
CVE: CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725, CVE-2012-1726
BID: 53948